P 660hw
Sign in to watchby Zyxel
CVEs (6)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2014-4162 | 0.03 | — | 0.00 | Jun 16, 2014 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Zyxel P-660HW-T1 (v3) wireless router allow remote attackers to hijack the authentication of administrators for requests that change the (1) wifi password or (2) SSID via a request to Forms/WLAN_General_1. | ||
| CVE-2013-3588 | 0.00 | — | 0.01 | Apr 2, 2014 | The web management interface on Zyxel P660 devices allows remote attackers to cause a denial of service (reboot) via a flood of TCP SYN packets. | ||
| CVE-2008-1255 | 0.00 | — | 0.00 | Mar 10, 2008 | The ZyXEL P-660HW series router maintains authentication state by IP address, which allows remote attackers to bypass authentication by establishing a session from a source IP address of a previously authenticated user. | ||
| CVE-2008-1256 | 0.00 | — | 0.01 | Mar 10, 2008 | The ZyXEL P-660HW series router has "admin" as its default password, which allows remote attackers to gain administrative access. | ||
| CVE-2008-1254 | 0.00 | — | 0.00 | Mar 10, 2008 | Multiple cross-site request forgery (CSRF) vulnerabilities on the ZyXEL P-660HW series router allow remote attackers to (1) change DNS servers and (2) add keywords to the "bannedlist" via unspecified vectors. | ||
| CVE-2008-1257 | 0.00 | — | 0.00 | Mar 10, 2008 | Cross-site scripting (XSS) vulnerability in Forms/DiagGeneral_2 on the ZyXEL P-660HW series router allows remote attackers to inject arbitrary web script or HTML via the PingIPAddr parameter. |